Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Comparative study of 940 nm and 1450 nm near infrared sensor for glucose concentration monitoring

10.12928/telkomnika.v17i2.10149
Kiki; Trisakti University Prawiroredjo , Engelin Shintadewi; Trisakti University Julian
In order to manage their blood glucose level, diabetics have to test their blood glucose level regularly. Unfortunately, the current blood glucose measurement device is uncomfortable, painful, event costly for the diabetics; therefore, a lot of effort is given to develop a noninvasive blood glucose meter. We studied the potential of two near infrared wavelength i.e. 1450 and 940 nm as glucose sensor. Each sensor consists of a light emitting diode (LED) as light source, a photodiode that is sensitive to that wavelength, transimpedance amplifier, and filters. An acrylic box size 5cmx1cmx5cm was used as glucose solution container. The LED and photodiode were located at each side of box width, at 1 cm distance. The container was than filled with various concentrations of glucose solution, and the sensor output voltages were measured. The results show that for glucose concentration 0 to 500 mg/dl, the output voltages of the 1450 nm sensor tend to lower when the glucose concentration is higher, therefore it has the potential to be used as glucose sensor. Different result is obtained from the 940 nm sensor where the output voltages were remained the same when the glucose concentration was varied.
Volume: 17
Issue: 2
Page: 981-985
Publish at: 2019-04-01

Analysis and investigation of a novel microwave sensor with high Q-factor for liquid characterization

10.12928/telkomnika.v17i2.11901
Ammar; Universiti Teknikal Malaysia Melaka (UTeM) Alhegazi , Zahriladha; Universiti Teknikal Malaysia Melaka (UTeM) Zakaria , Noor Azwan; Universiti Teknikal Malaysia Melaka (UTeM) Shairi , Tole; Universitas Ahmad Dahlan Sutikno , Rammah A.; Universiti Teknikal Malaysia Melaka (UTeM) Alahnomi , Ahmed Ismail; AMA International University Bahrain Abu-Khadrah
In this paper, a new design of microwave sensor with high Q-factor for liquid characterization is analyzed and investigated. The new microwave sensor is based on a gap waveguide cavity resonator (GWCR). The GWCR consists of upper plate, lower plate and array of pins on the lower plate. The liquid under test (LUT) is characterized by placing it inside the GWCR where the electric field concentrates using a quartz capillary that is passing through microfluidic channels. The results show that the proposed sensor has a high Q-factor of 4832. Moreover, the proposed sensor has the ability to characterize different types of liquids such as oils, ethanol, methanol and distilled water. The polynomial fitting method is used to extract the equation of the unknown permittivity of the LUT. The results show that the evaluated permittivity using the proposed sensor has a good agreement with the reference permittivity. Therefore, the proposed sensor is a good candidate for food and pharmaceutical applications.
Volume: 17
Issue: 2
Page: 1065-1070
Publish at: 2019-04-01

Usability of BLESS-implemented class room: a case study of mixtio

10.12928/telkomnika.v17i2.8999
Desita; Bina Nusantara University Mustikaningrum , Astari; Bina Nusantara University Retnowardhani
Conventional learning system and e-learning have their own strengths and weaknesses. To combine both systems, blended learning is created. In Extention Program of Informatics Engineering Faculty at XYZ university most of the students already have jobs. As much 47.5 % of students who take this program have a job in daily office hours. Then, to facilitate the learning process the XYZ university develop learning management system (LMS) by Moodle. XYZ university want to make a learning process with blended learning concept. However, the Moodle sytem has limited function to adapt the blended learning system (BLS). In the aim to improve the class usability in BLS, then this study proposes to apply to Blended Learning System Structure (BLESS) into LMS design. BLESS is offered as a framework which matches to learning and uses a top-down approach. Then, the system design maed it “Mixtio”. At the end of this study, it can be seen the analysis result of the use of BLESS can improve system usability of LMS.
Volume: 17
Issue: 2
Page: 703-711
Publish at: 2019-04-01

Switchable dual-band bandpass filter based on stepped impedance resonator with U-shaped defected microstrip structure for wireless applications

10.12928/telkomnika.v17i2.11637
Mussa; Universiti Teknikal Malaysia Melaka (UTeM) Mabrok , Zahriladha; Universiti Teknikal Malaysia Melaka (UTeM) Zakaria , Yully Erwanti; Universiti Teknikal Malaysia Melaka (UTeM) Masrukin , Tole; Ahmad Dahlan University Sutikno , A. R.; Universiti Teknikal Malaysia Melaka (UTeM) Othman , Nurhasniza; Universiti Teknikal Malaysia Melaka (UTeM) Edward
This paper presents a new technique in designing the switchable dual-band bandpass filter at 2.4 GHz and 3.5 GHz for WLAN and WiMAX applications. Wideband bandpass filter designed based on stepped impedance resonator at frequency of 3 GHz. To eliminate the interference from existing system that operates in the same frequency band, a defected microstrip structure applied and implemented to produce the notch response. In order to generate the switchable characteristic, the PIN diode was introduced at the dual-band filter. It exhibits that the measured results for switchable attributes when the diode is at OFF state, the wide passband is produced with the fractional bandwidth of 62.1 % centered at 2.9 GHz. Meanwhile, for the diode in ON state, the dual-passband has produced which centered at 2.5 GHz and 3.45 GHz. The experimental results showed good agreement with the simulation results. This structure is very useful for wireless communication systems and its applications.
Volume: 17
Issue: 2
Page: 1032-1039
Publish at: 2019-04-01

Multilayer neural network synchronized secured session key based encryption in wireless communication

10.11591/ijeecs.v14.i1.pp169-177
Arindam Sarkar , Joydeep Dey , Anirban Bhowmik
Energy computation concept of multilayer neural network synchronized on derived transmission key based encryption system has been proposed for wireless transactions. Multilayer perceptron transmitting machines accepted same input array, which in turn generate a resultant bit and the networks were trained accordingly to form a protected variable length secret-key. For each session, different hidden layer of multilayer neural network is selected randomly and weights of hidden units of this selected hidden layer help to form a secret session key. A novel approach to generate a transmission key has been explained in this proposed methodology. The last thirty two bits of the session key were taken into consideration to construct the transmission key. Inverse operations were carried out by the destination perceptron to decipher the data. Floating frequency analysis of the proposed encrypted stream of bits has yielded better degree of security results. Energy computation of the processed nodes inside multi layered networks can be done using this proposed frame of work.
Volume: 14
Issue: 1
Page: 169-177
Publish at: 2019-04-01

High gain boost converter with modified voltage multiplier for stand alone PV system

10.11591/ijeecs.v14.i1.pp185-192
Getzial Anbu Mani , A. K. Parvathy
Boost converters of high gain are used for photo voltaic systems to obtain high efficiency. These high gain Boost converters gives increased output voltage for a low input produces high outputs for low input voltage. The High gain boost converters have the following merits. Conduction losses input current ripple and stress across the switches is reduced while the efficiency is increases. The high gain of the converters with the above said merits is obtained by changing the duty cycle of switches accordingly .In this paper a boost converter working with interleaved concept along with a additional Nstage voltage Multiplier has been carried out by simulation using MATLAB/ simulink and the mathematical modeling of various parameters is also done.
Volume: 14
Issue: 1
Page: 185-192
Publish at: 2019-04-01

A novel key management protocol for vehicular cloud security

10.12928/telkomnika.v17i2.9278
Nayana; Sri Krishna Institute of Technology Hegde , Sunilkumar S.; Reva University Manvi
Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed protocol is efficient compared to existing key management algorithms in terms of key generation time, memory usage and cpu utilization.
Volume: 17
Issue: 2
Page: 857-865
Publish at: 2019-04-01

Compared to wireless deployment in areas with different environmentse

10.11591/ijece.v9i2.pp934-940
Inaam Abbas Hieder
In the mobile phone system, it is highly desirable to estimate the loss of the track not only to improve performance but also to achieve an accurate estimate of financial feasibility; the inaccurate estimate of track loss either leads to performance degradation or increased cost. Various models have been introduced to accurately estimate the path loss. One of these models is the Okomura / Hata model, which is recommended for estimating path loss in cellular systems that use micro cells. This system is suitable for use in a variety of environments. This study examines the comparison of path loss models for statistical analysis derived from experimental data collected in urban and suburban areas at frequencies of 150-1500 MHz’s The results of the measurements were used to develop path loss models in urban and suburban areas. The results showed that Pathloss increases in urban areas respectively.
Volume: 9
Issue: 2
Page: 934-940
Publish at: 2019-04-01

Air pollution monitoring system using LoRa modul as transceiver system

10.12928/telkomnika.v17i2.11760
Mia; Universitas Telkom Rosmiati , Moch. Fachru; Universitas Telkom Rizal , Fitri; Universitas Telkom Susanti , Gilang Fahreza; Universitas Telkom Alfisyahrin
Air pollution is a disaster that can indirectly interfere with human health, Indonesia is the third highest country in the world that has pollution levels, one of the types of pollution that threatens public health is the increase of CO, NO2 and SO2 level in the air. With the increasing level of air pollution in the city, it requires a device that can monitor air pollution in a real time. By integrating air sensor and Raspberry Pi as data processor and using LoRa module as transceiver module, then the process of transmitting data from transmitter to receiver can be done directly without connected internet. In a test, the system can transmit intensity data information by wireless system on Line Of Sight (LOS) scemes at a maximum distance of 1.7 Km and Non Line Of Sight (NLOS) scheme at a distance of 400 meters with a average delay is 2 second.
Volume: 17
Issue: 2
Page: 586-592
Publish at: 2019-04-01

Classification of breast cancer grades using physical parameters and K-nearest neighbor method

10.12928/telkomnika.v17i2.9797
Anak Agung Ngurah; University of Udayana Gunawan , S.; University of Udayana Poniman , I. Wayan; University of Udayana Supardi
Breast cancer is a health problem in the world. To overcome this problem requires early detection of breast cancer. The purpose of this study is to classify early breast cancer grades. Combination of physical parameters with k-nearest neighbor Method is proposed to detect early breast cancer grades. The experiments were performed on 87 mammograms consisting of 12 mammograms of grade 1,41 mammograms of grade 2 and 34 mammogram of grade 3. The proposed method was effective to classify the grades of breast cancer by an accuracy of 64.36%, 50% sensitivity and 73,5% specitifity. Physical parameters can be used to classify grades of breast cancer. The results of this study can be used to complement the diagnosis of breast mammography examination.
Volume: 17
Issue: 2
Page: 637-644
Publish at: 2019-04-01

MOS gas sensor of meat freshness analysis on E-nose

10.12928/telkomnika.v17i2.11787
Budi; Universitas Muria Kudus Gunawan , Salman; Universitas Muria Kudus Alfarisi , Gunanjar; Universitas Muria Kudus Satrio , Arief; Universitas Jenderal Soedirman Grendeng Sudarmaji , Malvin; Universitas Jenderal Soedirman Grendeng Malvin , Krisyarangga; Universitas Jenderal Soedirman Grendeng Krisyarangga
The high demand of meat causes the seller mix the fresh and not-fresh meat. Electronic nose was used to detect the quality of the meat quickly and accurately. This research is proposed to test and analyze the sensitivity of MOS sensor in the electronic nose and simulate it using Matlab to identify meat classification using neural network. Test parameters based on Indonesian National Standard (SNI 3932-2008) requirement on the quality of carcass and meat. In this simulation, the number of neurons in the hidden layer was varied to find the most accurate identification. The sensitivity analysis of the MOS sensor was conducted by testing the meat sample aroma, calculate the sensitivity, identify the formation of input, hidden layer, outputs, and simulate the result of the varied formation. Then, found the number of the most optimal neurons. The result of the data training will be applied to the real instrument.
Volume: 17
Issue: 2
Page: 771-780
Publish at: 2019-04-01

Guillou-quisquater protocol for user authentication based on zero knowledge proof

10.12928/telkomnika.v17i2.11754
Kevin; Universitas Multimedia Nusantara Kusnardi , Dennis; Universitas Multimedia Nusantara Gunawan
Authentication is the act of confirming the validity of someone’s personal data. In the traditional authentication system, username and password are sent to the server for verification. However, this scheme is not secure, because the password can be sniffed. In addition, the server will keep the user’s password for the authentication. This makes the system vulnerable when the database server is hacked. Zero knowledge authentication allows server to authenticate user without knowing the user’s password. In this research, this scheme was implemented with Guillou-Quisquater protocol. Two login mechanisms were used: file-based certificate with key and local storage. Testing phase was carried out based on the Open Web Application Security Project (OWASP) penetration testing scheme. Furthermore, penetration testing was also performed by an expert based on Acunetix report. Three potential vulnerabilities were found and risk estimation was calculated. According to OWASP risk rating, these vulnerabilities were at the medium level.
Volume: 17
Issue: 2
Page: 826-834
Publish at: 2019-04-01

Comparison of different configuration space representations for path planning under combinatorial method

10.11591/ijeecs.v14.i1.pp1-8
Sanjoy Kumar Debnath , Rosli Omar , Nor Badariyah Abdul Latip
The use of autonomous vehicle/robot has been adopted widely to replace human beings in performing dangerous missions in adverse environments. Keeping this in mind, path planning ensures that the autonomous vehicle must safely arrive to its destination with required criteria like lower computation time, shortest travelled path and completeness. There are few kinds of path planning strategies, such as combinatorial method, sampling based method and bio-inspired method. Among them, combinatorial method can accomplish couple of criteria without further adjustment in conventional algorithm. Configuration space provides detailed information about the position of all points in the system and it is the space for all configurations. Therefore, C-space denotes the actual free space zone for the movement of robot and guarantees that the vehicle or robot must not collide with the obstacle. This paper analyses different C-Space representation techniques under combinatorial method based on the past researches and their findings with different criteria such as optimality, completeness, safety, memory uses, real time and computational time etc. Visibility Graph has optimality which is a unique from other
Volume: 14
Issue: 1
Page: 1-8
Publish at: 2019-04-01

The step construction of penalized spline in electrical power load data

10.12928/telkomnika.v17i2.8460
Rezzy Eko; University of Malaysia Caraka , Sakhinah Abu; University of Malaysia Bakar , Gangga; PGRI Adi Buana Surabaya University Anuraga , M. A.; Padjadjaran University Mauludin , Anwardi; UIN Sultan Syarif Kasim Riau Anwardi , Suwito; Universitas Muslim Indonesia Pomalingo , Vidila; Serang University Rosalina
Electricity is one of the most pressing needs for human life. Electricity is required not only for lighting but also to carry out activities of daily life related to activities Social and economic community. The problems is currently a limited supply of electricity resulting in an energy crisis. Electrical power is not storable therefore it is a vital need to make a good electricity demand forecast. According to this, we conducted an analysis based on power load. Given a baseline to this research, we applied penalized splines (P-splines) which led to a powerful and applicable smoothing technique. In this paper, we revealed penalized spline degree 1 (linear) with 8 knots is the best model since it has the lowest GCV (Generelized Cross Validation). This model have become a compelling model to predict electric power load evidenced by of Mean Absolute Percentage Error (MAPE=0.013) less than 10%.
Volume: 17
Issue: 2
Page: 1023-1031
Publish at: 2019-04-01

Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in Data Protection of Electric Power Consumption

10.11591/ijece.v9i2.pp1399-1409
Francisca Angélica Elizalde-Canales , Iván de Jesus Rivas-Cambero , Lucio Fidel Rebolledo-Herrera , Cesar Joel Camacho-Bello
Cryptographic algorithms have played an important role in information security for protecting privacy. The literature provides evidence that many types of chaotic cryptosystems have been proposed. These chaotic systems encode information to obviate its orbital instability and ergodicity. In this work, a pseudo-random cryptographic generator algorithm with a symmetric key, based on chaotic functions, is proposed. Moreover, the algorithm exploits dynamic simplicity and synchronization to generate encryption sub-keys using unpredictable seeds, extracted from a chaotic zone, in order to increase their level of randomness. Also, it is applied to a simulated electrical energy consumption signal and implemented on a prototype, using low hardware resources, to measure physical variables; hence, the unpredictability degree was statistically analyzed using the resulting cryptogram. It is shown that the pseudo-random sequences produced by the cryptographic key generator have acceptable properties with respect to randomness, which are validated in this paper using National Institute of Standards and Technology (NIST) statistical tests. To complement the evaluation of the encrypted data, the Lena image is coded and its metrics are compared with those reported in the literature, yielding some useful results.
Volume: 9
Issue: 2
Page: 1399-1409
Publish at: 2019-04-01
Show 1309 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration